Integer overflow in QEMU - CVE-2015-5239
Published: August 5, 2020
QEMU
QEMU
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in the VNC display driver in QEMU. A remote attacker can pass specially crafted CLIENT_CUT_TEXT message to the application, trigger integer overflow and perform a denial of service attack via infinite loop.
Remediation
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/02/7
- http://www.ubuntu.com/usn/USN-2745-1
- https://github.com/qemu/qemu/commit/f9a70e79391f6d7c2a912d785239ee8effc1922d